Designing polymer structures and polymer blends opens opportunities to improve the performance of plastics. Blending poly(butylene adipate-co-terephthalate) (PBAT) and polylactide (PLA) is a ...cost-effective approach to achieve a new sustainable material with complementary properties. This study aimed to predict the theoretical miscibility of PBAT/PLA blends at the molecular level. First, the basic properties and the structure of PBAT and PLA are introduced, respectively. Second, using the group contribution methods of van Krevelen and Hoy, the Hansen and Hildebrand solubility parameters of PBAT and PLA were calculated, and the effect of the molar ratio of the monomers in PBAT on the miscibility with PLA was predicted. Third, the dependence of the molecular weight on the blend miscibility was simulated using the solubility parameters and Flory–Huggins theory. Next, the glass transition temperature of miscible PBAT/PLA blends, estimated using the Fox equation, is shown graphically. According to the prediction and simulation, the blends with a number-average molecular weight of 30 kg/mol for each component were thermodynamically miscible at 296 K and 463 K with the possibility of spinodal decomposition at 296 K and 30% volume fraction of PBAT. This study contributes to the strategic synthesis of PBAT and the development of miscible PBAT/PLA blends.
Polylactide (PLA), poly(butylene succinate) (PBS) and blends thereof have been researched in the last two decades due to their commercial availability and the upcoming requirements for using ...bio-based chemical building blocks. Blends consisting of PLA and PBS offer specific material properties. However, their thermodynamically favored biphasic composition often restricts their applications. Many approaches have been taken to achieve better compatibility for tailored and improved material properties. This review focuses on the modification of PLA/PBS blends in the timeframe from 2007 to early 2019. Firstly, neat polymers of PLA and PBS are introduced in respect of their origin, their chemical structure, thermal and mechanical properties. Secondly, recent studies for improving blend properties are reviewed mainly under the focus of the toughness modification using methods including simple blending, plasticization, reactive compatibilization, and copolymerization. Thirdly, we follow up by reviewing the effect of PBS addition, stereocomplexation, nucleation, and processing parameters on the crystallization of PLA. Next, the biodegradation and disintegration of PLA/PBS blends are summarized regarding the European and International Standards, influencing factors, and degradation mechanisms. Furthermore, the recycling and application potential of the blends are outlined.
Trust management of the Internet of Connected Vehicles has been a hot topic in recent years with the rapid development of UGV technologies. However, existing resolutions based on trustworthiness ...verification among vehicles make the traffic event transmission quite inefficient. In this article, we assume that the deployed roadside units (RSUs) can provide efficient communication between any pair of RSU and vehicle and propose vehicle cash (Vcash), a reputation framework for identifying denial of traffic service, to resolve the trustworthiness problem in the application level of the Internet of Connected Vehicles. In our reputation framework, every vehicle communicates with the RSU directly for traffic event verification, and spreads verified traffic event notification. We borrow the idea of market trading, and set up trading rules to restrict the malicious vehicle's spread of false message, and to encourage vehicles to contribute to the traffic event monitoring and verification. To evaluate the effectiveness of our reputation framework, we conduct a simulation experimental. Our experiment results indicate that our proposal manages to avoid bogus event spread, and a vehicle in our framework has to contribute to the traffic event detection to normally employ the traffic service.
Polymer blends of poly(butylene adipate-co-terephthalate) (PBAT) and polylactide (PLA) have been drawn attention due to the application potential as packaging or agricultural films. This study aims ...to determine the manufacturability, miscibility and mechanical properties of uncompatibilized PBAT/PLA blends prepared using different techniques. First, PBAT and PLA are melt-blended in a wide range of ratios from 90/10 to 10/90. The compounds are then processed into pressed panels, flat films and blown films. Finally, the thermal, morphological, rheological and mechanical properties of these blends are investigated. PBAT/PLA blends have a small difference of solubility parameters, predicting theoretically good miscibility. However, they show two almost unchanged glass transition temperatures in the DSC, phase separation in SEM and two relaxation mechanisms in the Cole–Cole plot. The phase morphology varies depending on both the blend ratios and the preparation techniques. Tensile tests indicate that with increasing PLA content the elongation at break decreases. A good correlation between the elongation at break and the tear propagation resistance is found. Furthermore, the trouser tear method is proven to be more applicable to differentiate highly extensible blown films compared with the Elmendorf tear method.
Conducting reputation management is very important for Internet of vehicles. However, most of the existing work evaluate the effectiveness of their schemes with settled attacking behaviors in their ...simulation, which cannot represent the real scenarios. In this paper, we propose to consider dynamical and diversity attacking strategies in the simulation of reputation management scheme evaluation. To that end, we apply evolutionary game theory to model the evolution process of malicious users' attacking strategies, and discuss the methodology of the evaluation simulations. We further apply our evaluation method to a reputation management scheme with multiple utility functions, and discuss the evaluation results. The results indicate that our evaluation method is able to depict the evolving process of the dynamic attacking strategies in a vehicular network, and the final state of the simulation could be used to quantify the protection effectiveness of the reputation management scheme.
Abstract
A blend of poly(butylene adipate terephthalate) (PBAT) and polylactide (PLA) is a combination of biodegradable materials. This study aims to prepare compatibilized PBAT/PLA in a ...cost-effective and timesaving way and to process the material into blown films by fine-tuning the processing parameters. First, a catalyst masterbatch is prepared by transesterification of PBAT and PLA in the presence of tetrabutyl titanate (TBT) as a catalyst. This is followed by the compounding of the two polymer types in combination with the catalyst masterbatch. Third, the compounds are processed into blown films and panels. The processing parameters for film blowing are set to reduce the anisotropy. Finally, the material properties are evaluated such as mechanical tests. The fine-tuning of parameter settings including the blow-up ratio and draw-down ratio results in a higher degree of isotropy of the blown film. By adding the catalyst masterbatch (2 wt%, which corresponds to TBT of approximately 0.002 wt% with copolymers formed) in combination with the fine-tuning of parameter settings, the samples achieved a significant improvement on the material properties. The morphology of the cryogenically fractured panel samples shows a decrease in the diameter of the dispersed phase. In the cross and machine directions, the elongation at break increased by 85 and 93%, and the trouser tear propagation resistance increased by 2.4 and 10 N mm
−1
, respectively. Furthermore, both the elongation at break and the trouser tear propagation of the blown films achieved a higher degree of isotropy.
With the development of Internet-of-Things (IoT) technology, various types of information, such as social resources and physical resources, are deeply integrated for different comprehensive ...applications. Social networking, car networking, medical services, video surveillance, and other forms of the IoT information service model gradually change people's daily lives. Facing the vast amounts of IoT information data, the IoT search technology is used to quickly find accurate information to meet the real-time search needs of users. However, IoT search requires using a large amount of user private information, such as personal health information, location information, and social relations information, to provide personalized services. Employing private information from users will encounter security problems if an effective access control mechanism is missing during the IoT search process. An access control mechanism can effectively monitor the access activities of resources and ensure that authorized users access information resources under legitimate conditions. This survey examines the growing literature on access control for an IoT search. Problems and challenges of access control mechanisms are analyzed to facilitate the adoption of access control solutions in real-life settings. This article aims to provide theoretical, methodological, and technical guidance for IoT search access control mechanisms in large-scale dynamic heterogeneous environments. Based on a literature review, we also analyzed the future development direction of access control in the age of IoT.
Edge computing provides high-class intelligent services and computing capabilities at the edge of the networks. The aim is to ease the backhaul impacts and offer an improved user experience. However, ...the edge artificial intelligence exacerbates the security of the cloud computing environment due to the dissociation of data, access control, and service stages. In order to prevent users from carrying out lateral movement attacks in an edge-cloud computing environment, in this paper we propose a real-time lateral movement detection method, named CloudSEC, based on an evidence reasoning network for the edge-cloud environment. First, the concept of vulnerability correlation is introduced. Based on the vulnerability knowledge and environmental information of the network system, the evidence reasoning network is constructed, and the lateral movement reasoning ability provided by the evidence reasoning network is then used. The experiment results show that CloudSEC provides a strong guarantee for the rapid and effective evidence investigation, as well as real-time attack detection.
With the development of the Internet of Things and big data technology, the intelligent transportation system is becoming the main development direction of future transportation systems. The time ...required for a given trajectory in a transportation system can be accurately estimated using the trajectory data of the taxis in a city. This is a very challenging task. Although historical data have been used in existing research, excessive use of trajectory information in historical data or inaccurate neighbor trajectory information does not allow for a better prediction accuracy of the query trajectory. In this article, we propose a deep learning method based on neighbors for travel time estimation (TTE), called the Nei-TTE method. We divide the entire trajectory into multiple disjoint segments and use the historical trajectory data approximated at the time level. Our model captures the characteristics of each segment and utilizes the trajectory characteristics of adjacent segments as the road network topology and speed interact. We use velocity features to effectively represent adjacent segment structures. The experiments on the Porto dataset show that the experimental results of our model are significantly better than those of the existing models.
A reputation management scheme plays a critical role for secure communications in vehicular networks. However, due to the limited wireless communication in the past few years, the existing solutions ...fail to capture the current high-performance network communication provided by the 5G network. As a result, the attributes of security and efficiency can hardly be satisfied at the same time. In this article, we propose IDES, which provides a centralized reputation management scheme to detect malicious nodes in the vehicular network. To discuss the feasibility of our scheme, we design a practical system structure to which our reputation management scheme could be applied and discuss the possible threat modes to our system. With a self-developed event-based emulator, we evaluate the performance of our IDES under malicious attack. Toward defense against the 3 thread mode attack we discuss, we prove that our scheme could take effect much faster, and outperforms the current decentralized trust management schemes.